Search results for: data mining technique
24767 Evaluation of Hydrocarbon Prospects of 'ADE' Field, Niger Delta
Authors: Oluseun A. Sanuade, Sanlinn I. Kaka, Adesoji O. Akanji, Olukole A. Akinbiyi
Abstract:
Prospect evaluation of ‘the ‘ADE’ field was done using 3D seismic data and well log data. The field is located in the offshore Niger Delta where water depth ranges from 450 to 800 m. The objectives of this study are to explore deeper prospects and to ascertain the kind of traps that are favorable for the accumulation of hydrocarbon in the field. Six horizons with major and minor faults were identified and mapped in the field. Time structure maps of these horizons were generated and using the available check-shot data the maps were converted to top structure maps which were used to calculate the hydrocarbon volume. The results show that regional structural highs that are trending in northeast-southwest (NE-SW) characterized a large portion of the field. These highs were observed across all horizons revealing a regional post-depositional deformation. Three prospects were identified and evaluated to understand the different opportunities in the field. These include stratigraphic pinch out and bi-directional downlap. The results of this study show that the field has potentials for new opportunities that could be explored for further studies.Keywords: hydrocarbon, play, prospect, stratigraphy
Procedia PDF Downloads 27524766 A Middleware Management System with Supporting Holonic Modules for Reconfigurable Management System
Authors: Roscoe McLean, Jared Padayachee, Glen Bright
Abstract:
There is currently a gap in the technology covering the rapid establishment of control after a reconfiguration in a Reconfigurable Manufacturing System. This gap involves the detection of the factory floor state and the communication link between the factory floor and the high-level software. In this paper, a thin, hardware-supported Middleware Management System (MMS) is proposed and its design and implementation are discussed. The research found that a cost-effective localization technique can be combined with intelligent software to speed up the ramp-up of a reconfigured system. The MMS makes the process more intelligent, more efficient and less time-consuming, thus supporting the industrial implementation of the RMS paradigm.Keywords: intelligent systems, middleware, reconfigurable manufacturing, management system
Procedia PDF Downloads 68124765 Development of Methotrexate Nanostructured Lipid Carriers for Topical Treatment of Psoriasis: Optimization, Evaluation, and in vitro Studies
Authors: Yogeeta O. Agrawal, Hitendra S. Mahajan, Sanjay J. Surana
Abstract:
Methotrexate is effective in controlling recalcitrant psoriasis when administered by the oral or parenteral route long-term. However, the systematic use of this drug may provoke any of a number of side effects, notably hepatotoxic effects. To reduce these effects, clinical studies have been done with topical MTx. It is useful in treating a number of cutaneous conditions, including psoriasis. A major problem in topical administration of MTx currently available in market is that the drug is hydrosoluble and is mostly in the dissociated form at physiological pH. Its capacity for passive diffusion is thus limited. Localization of MTx in effected layers of skin is likely to improve the role of topical dosage form of the drug as a supplementary to oral therapy for treatment of psoriasis. One of the possibilities for increasing the penetration of drugs through the skin is the use of Nanostructured lipid Carriers. The objective of the present study was to formulate and characterize Methotrexate loaded Nanostructured Lipid Carriers (MtxNLCs), to understand in vitro drug release and evaluate the role of the developed gel in the topical treatment of psoriasis. MtxNLCs were prepared by solvent diffusion technique using 3(2) full factorial design.The mean diameter and surface morphology of MtxNLC was evaluated. MtxNLCs were lyophilized and crystallinity of NLC was characterized by Differential Scanning Calorimtery (DSC) and powder X-Ray Diffraction (XRD). The NLCs were incorporated in 1% w/w Carbopol 934 P gel base and in vitro skin deposition studies in Human Cadaver Skin were conducted. The optimized MtxNLCs were spherical in shape, with average particle size of 253(±9.92)nm, zeta potential of -30.4 (±0.86) mV and EE of 53.12(±1.54)%. DSC and XRD data confirmed the formation of NLCs. Significantly higher deposition of Methotrexate was found in human cadaver skin from MtxNLC gel (71.52 ±1.23%) as compared to Mtx plain gel (54.28±1.02%). Findings of the studies suggest that there is significant improvement in therapeutic index in treatment of psoriasis by MTx-NLCs incorporated gel base developed in this investigation over plain drug gel currently available in the market.Keywords: methotrexate, psoriasis, NLCs, hepatotoxic effects
Procedia PDF Downloads 43224764 Documenting the 15th Century Prints with RTI
Authors: Peter Fornaro, Lothar Schmitt
Abstract:
The Digital Humanities Lab and the Institute of Art History at the University of Basel are collaborating in the SNSF research project ‘Digital Materiality’. Its goal is to develop and enhance existing methods for the digital reproduction of cultural heritage objects in order to support art historical research. One part of the project focuses on the visualization of a small eye-catching group of early prints that are noteworthy for their subtle reliefs and glossy surfaces. Additionally, this group of objects – known as ‘paste prints’ – is characterized by its fragile state of preservation. Because of the brittle substances that were used for their production, most paste prints are heavily damaged and thus very hard to examine. These specific material properties make a photographic reproduction extremely difficult. To obtain better results we are working with Reflectance Transformation Imaging (RTI), a computational photographic method that is already used in archaeological and cultural heritage research. This technique allows documenting how three-dimensional surfaces respond to changing lighting situations. Our first results show that RTI can capture the material properties of paste prints and their current state of preservation more accurately than conventional photographs, although there are limitations with glossy surfaces because the mathematical models that are included in RTI are kept simple in order to keep the software robust and easy to use. To improve the method, we are currently developing tools for a more detailed analysis and simulation of the reflectance behavior. An enhanced analytical model for the representation and visualization of gloss will increase the significance of digital representations of cultural heritage objects. For collaborative efforts, we are working on a web-based viewer application for RTI images based on WebGL in order to make acquired data accessible to a broader international research community. At the ICDH Conference, we would like to present unpublished results of our work and discuss the implications of our concept for art history, computational photography and heritage science.Keywords: art history, computational photography, paste prints, reflectance transformation imaging
Procedia PDF Downloads 27724763 Optimisation of the Input Layer Structure for Feedforward Narx Neural Networks
Authors: Zongyan Li, Matt Best
Abstract:
This paper presents an optimization method for reducing the number of input channels and the complexity of the feed-forward NARX neural network (NN) without compromising the accuracy of the NN model. By utilizing the correlation analysis method, the most significant regressors are selected to form the input layer of the NN structure. An application of vehicle dynamic model identification is also presented in this paper to demonstrate the optimization technique and the optimal input layer structure and the optimal number of neurons for the neural network is investigated.Keywords: correlation analysis, F-ratio, levenberg-marquardt, MSE, NARX, neural network, optimisation
Procedia PDF Downloads 37624762 Robust Control of a Dynamic Model of an F-16 Aircraft with Improved Damping through Linear Matrix Inequalities
Authors: J. P. P. Andrade, V. A. F. Campos
Abstract:
This work presents an application of Linear Matrix Inequalities (LMI) for the robust control of an F-16 aircraft through an algorithm ensuring the damping factor to the closed loop system. The results show that the zero and gain settings are sufficient to ensure robust performance and stability with respect to various operating points. The technique used is the pole placement, which aims to put the system in closed loop poles in a specific region of the complex plane. Test results using a dynamic model of the F-16 aircraft are presented and discussed.Keywords: F-16 aircraft, linear matrix inequalities, pole placement, robust control
Procedia PDF Downloads 31124761 Enhancing Information Technologies with AI: Unlocking Efficiency, Scalability, and Innovation
Authors: Abdal-Hafeez Alhussein
Abstract:
Artificial Intelligence (AI) has become a transformative force in the field of information technologies, reshaping how data is processed, analyzed, and utilized across various domains. This paper explores the multifaceted applications of AI within information technology, focusing on three key areas: automation, scalability, and data-driven decision-making. We delve into how AI-powered automation is optimizing operational efficiency in IT infrastructures, from automated network management to self-healing systems that reduce downtime and enhance performance. Scalability, another critical aspect, is addressed through AI’s role in cloud computing and distributed systems, enabling the seamless handling of increasing data loads and user demands. Additionally, the paper highlights the use of AI in cybersecurity, where real-time threat detection and adaptive response mechanisms significantly improve resilience against sophisticated cyberattacks. In the realm of data analytics, AI models—especially machine learning and natural language processing—are driving innovation by enabling more precise predictions, automated insights extraction, and enhanced user experiences. The paper concludes with a discussion on the ethical implications of AI in information technologies, underscoring the importance of transparency, fairness, and responsible AI use. It also offers insights into future trends, emphasizing the potential of AI to further revolutionize the IT landscape by integrating with emerging technologies like quantum computing and IoT.Keywords: artificial intelligence, information technology, automation, scalability
Procedia PDF Downloads 2124760 D3Advert: Data-Driven Decision Making for Ad Personalization through Personality Analysis Using BiLSTM Network
Authors: Sandesh Achar
Abstract:
Personalized advertising holds greater potential for higher conversion rates compared to generic advertisements. However, its widespread application in the retail industry faces challenges due to complex implementation processes. These complexities impede the swift adoption of personalized advertisement on a large scale. Personalized advertisement, being a data-driven approach, necessitates consumer-related data, adding to its complexity. This paper introduces an innovative data-driven decision-making framework, D3Advert, which personalizes advertisements by analyzing personalities using a BiLSTM network. The framework utilizes the Myers–Briggs Type Indicator (MBTI) dataset for development. The employed BiLSTM network, specifically designed and optimized for D3Advert, classifies user personalities into one of the sixteen MBTI categories based on their social media posts. The classification accuracy is 86.42%, with precision, recall, and F1-Score values of 85.11%, 84.14%, and 83.89%, respectively. The D3Advert framework personalizes advertisements based on these personality classifications. Experimental implementation and performance analysis of D3Advert demonstrate a 40% improvement in impressions. D3Advert’s innovative and straightforward approach has the potential to transform personalized advertising and foster widespread personalized advertisement adoption in marketing.Keywords: personalized advertisement, deep Learning, MBTI dataset, BiLSTM network, NLP.
Procedia PDF Downloads 4824759 Communication Infrastructure Required for a Driver Behaviour Monitoring System, ‘SiaMOTO’ IT Platform
Authors: Dogaru-Ulieru Valentin, Sălișteanu Ioan Corneliu, Ardeleanu Mihăiță Nicolae, Broscăreanu Ștefan, Sălișteanu Bogdan, Mihai Mihail
Abstract:
The SiaMOTO system is a communications and data processing platform for vehicle traffic. The human factor is the most important factor in the generation of this data, as the driver is the one who dictates the trajectory of the vehicle. Like any trajectory, specific parameters refer to position, speed and acceleration. Constant knowledge of these parameters allows complex analyses. Roadways allow many vehicles to travel through their confined space, and the overlapping trajectories of several vehicles increase the likelihood of collision events, known as road accidents. Any such event has causes that lead to its occurrence, so the conditions for its occurrence are known. The human factor is predominant in deciding the trajectory parameters of the vehicle on the road, so monitoring it by knowing the events reported by the DiaMOTO device over time, will generate a guide to target any potentially high-risk driving behavior and reward those who control the driving phenomenon well. In this paper, we have focused on detailing the communication infrastructure of the DiaMOTO device with the traffic data collection server, the infrastructure through which the database that will be used for complex AI/DLM analysis is built. The central element of this description is the data string in CODEC-8 format sent by the DiaMOTO device to the SiaMOTO collection server database. The data presented are specific to a functional infrastructure implemented in an experimental model stage, by installing on a number of 50 vehicles DiaMOTO unique code devices, integrating ADAS and GPS functions, through which vehicle trajectories can be monitored 24 hours a day.Keywords: DiaMOTO, Codec-8, ADAS, GPS, driver monitoring
Procedia PDF Downloads 8824758 Predictive Modeling of Bridge Conditions Using Random Forest
Authors: Miral Selim, May Haggag, Ibrahim Abotaleb
Abstract:
The aging of transportation infrastructure presents significant challenges, particularly concerning the monitoring and maintenance of bridges. This study investigates the application of Random Forest algorithms for predictive modeling of bridge conditions, utilizing data from the US National Bridge Inventory (NBI). The research is significant as it aims to improve bridge management through data-driven insights that can enhance maintenance strategies and contribute to overall safety. Random Forest is chosen for its robustness, ability to handle complex, non-linear relationships among variables, and its effectiveness in feature importance evaluation. The study begins with comprehensive data collection and cleaning, followed by the identification of key variables influencing bridge condition ratings, including age, construction materials, environmental factors, and maintenance history. Random Forest is utilized to examine the relationships between these variables and the predicted bridge conditions. The dataset is divided into training and testing subsets to evaluate the model's performance. The findings demonstrate that the Random Forest model effectively enhances the understanding of factors affecting bridge conditions. By identifying bridges at greater risk of deterioration, the model facilitates proactive maintenance strategies, which can help avoid costly repairs and minimize service disruptions. Additionally, this research underscores the value of data-driven decision-making, enabling better resource allocation to prioritize maintenance efforts where they are most necessary. In summary, this study highlights the efficiency and applicability of Random Forest in predictive modeling for bridge management. Ultimately, these findings pave the way for more resilient and proactive management of bridge systems, ensuring their longevity and reliability for future use.Keywords: data analysis, random forest, predictive modeling, bridge management
Procedia PDF Downloads 2724757 Knowledge, Attitude, and Practice Regarding Standard Precautions in Medical Students of Rawalpindi Medical University, Pakistan; A Cross-Sectional Descriptive Study
Authors: Zainab Idrees Ahmad, Mahjabeen Qureshi, Zainab Hussain
Abstract:
Standard precautions are a set of infection control practices used to prevent the transmission of diseases that can be acquired by contact with body fluids, non-intact skin, and mucous membranes. Lack of practice of SPs can result in a considerable increase in morbidity and mortality rates. Medical students (the future physicians) should have the highest knowledge of standard precautions to prevent the spread of nosocomial infections and ensure their safety as well. This study was designed. To assess the knowledge of medical students regarding standard precautions. And explore the attitude of medical students of MBBS in the third, fourth and final year towards standard precautions.: A descriptive cross-sectional study was conducted in the setting of Rawalpindi Medical University, Pakistan including the students of MBBS in their 3rd, 4th and final years. The study duration was from October 2022 to February 2023. The sample size calculated was 282 with a confidence interval of 95%. A questionnaire was structured utilizing the WHO guidelines on SPs assessing knowledge and attitude regarding hand hygiene, needle stick injury, use of gloves and mask, and sharp disposal. A total of 300 responses were received utilizing the technique of non-random convenience sampling. Data was analyzed using the latest version of SPSS.:Knowledge score regarding components of SPs, hand hygiene, and moments of hand hygiene was satisfactory. However, score regarding the use of PPE, needle stick injury, and sharp disposal was low. Almost all the students were compliant with the proper washing of hands but the observation of recommended time length was lacking. Compliance with the use of correct PPE and informing the supervisor upon getting a needle stick injury was low. This study signifies that medical students lack knowledge regarding standard precautions. This is alarming as this can be the vehicle for the spread of nosocomial infections. Proper training should be given to medical students to prevent the spread of hospital-acquired infections.Keywords: attitude, knowledge, medical students, standard precautions
Procedia PDF Downloads 13224756 Electronic Equipment Failure due to Corrosion
Authors: Yousaf Tariq
Abstract:
There are many reasons which are involved in electronic equipment failure i.e. temperature, humidity, dust, smoke etc. Corrosive gases are also one of the factor which may involve in failure of equipment. Sensitivity of electronic equipment increased when “lead-free” regulation enforced on manufacturers. In data center, equipment like hard disk, servers, printed circuit boards etc. have been exposed to gaseous contamination due to increase in sensitivity. There is a worldwide standard to protect electronic industrial electronic from corrosive gases. It is well known as “ANSI/ISA S71.04 – 1985 - Environmental Conditions for Control Systems: Airborne Contaminants. ASHRAE Technical Committee (TC) 9.9 members also recommended ISA standard in their whitepaper on Gaseous and Particulate Contamination Guideline for data centers. TC 9.9 members represented some of the major IT equipment manufacturers e.g. IBM, HP, Cisco etc. As per standard practices, first step is to monitor air quality in data center. If contamination level shows more than G1, it means that gas-phase air filtration is required other than dust/smoke air filtration. It is important that outside fresh air entering in data center should have pressurization/re-circulated process in order to absorb corrosive gases and to maintain level within specified limit. It is also important that air quality monitoring should be conducted once in a year. Temperature and humidity should also be monitored as per standard practices to maintain level within specified limit.Keywords: corrosive gases, corrosion, electronic equipment failure, ASHRAE, hard disk
Procedia PDF Downloads 33624755 Household Food Security and Poverty Reduction in Cameroon
Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien
Abstract:
The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.Keywords: food security, poverty reduction, SDGs, Cameroon
Procedia PDF Downloads 8524754 A Predictive Model of Supply and Demand in the State of Jalisco, Mexico
Authors: M. Gil, R. Montalvo
Abstract:
Business Intelligence (BI) has become a major source of competitive advantages for firms around the world. BI has been defined as the process of data visualization and reporting for understanding what happened and what is happening. Moreover, BI has been studied for its predictive capabilities in the context of trade and financial transactions. The current literature has identified that BI permits managers to identify market trends, understand customer relations, and predict demand for their products and services. This last capability of BI has been of special concern to academics. Specifically, due to its power to build predictive models adaptable to specific time horizons and geographical regions. However, the current literature of BI focuses on predicting specific markets and industries because the impact of such predictive models was relevant to specific industries or organizations. Currently, the existing literature has not developed a predictive model of BI that takes into consideration the whole economy of a geographical area. This paper seeks to create a predictive model of BI that would show the bigger picture of a geographical area. This paper uses a data set from the Secretary of Economic Development of the state of Jalisco, Mexico. Such data set includes data from all the commercial transactions that occurred in the state in the last years. By analyzing such data set, it will be possible to generate a BI model that predicts supply and demand from specific industries around the state of Jalisco. This research has at least three contributions. Firstly, a methodological contribution to the BI literature by generating the predictive supply and demand model. Secondly, a theoretical contribution to BI current understanding. The model presented in this paper incorporates the whole picture of the economic field instead of focusing on a specific industry. Lastly, a practical contribution might be relevant to local governments that seek to improve their economic performance by implementing BI in their policy planning.Keywords: business intelligence, predictive model, supply and demand, Mexico
Procedia PDF Downloads 12724753 Antecedent of Loyalty: A Case of Inbound Tourists in Bangkok, Thailand
Authors: Natnicha Hasoontree
Abstract:
This purpose of this paper was to investigate the influence of loyalty of inbound tourists towards tourist destinations in Bangkok, Thailand. The antecedents of loyalty in this study included tourists’ satisfaction towards tourist destinations, perceived value of tourist destinations, feelings of engagement with tourist destinations, acquaintance with tourist destinations, and seeking novelty. By using multi-stage sampling technique, 400 tourists were sampled: 200 male and 200 female inbound tourists. The findings revealed that inbound tourists’ satisfaction was the most important factor that could influence the factor of loyalty. The findings indicated that the overall antecedents had a mean of 4.416 with the overall standard deviation of 0.808.Keywords: antecedents, loyalty, inbound tourists, tourist destinations
Procedia PDF Downloads 51524752 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph
Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao
Abstract:
As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning
Procedia PDF Downloads 17224751 Double Clustering as an Unsupervised Approach for Order Picking of Distributed Warehouses
Authors: Hsin-Yi Huang, Ming-Sheng Liu, Jiun-Yan Shiau
Abstract:
Planning the order picking lists of warehouses to achieve when the costs associated with logistics on the operational performance is a significant challenge. In e-commerce era, this task is especially important productive processes are high. Nowadays, many order planning techniques employ supervised machine learning algorithms. However, the definition of which features should be processed by such algorithms is not a simple task, being crucial to the proposed technique’s success. Against this background, we consider whether unsupervised algorithms can enhance the planning of order-picking lists. A Zone2 picking approach, which is based on using clustering algorithms twice, is developed. A simplified example is given to demonstrate the merit of our approach.Keywords: order picking, warehouse, clustering, unsupervised learning
Procedia PDF Downloads 16524750 Fueling Efficient Reporting And Decision-Making In Public Health With Large Data Automation In Remote Areas, Neno Malawi
Authors: Wiseman Emmanuel Nkhomah, Chiyembekezo Kachimanga, Julia Huggins, Fabien Munyaneza
Abstract:
Background: Partners In Health – Malawi introduced one of Operational Researches called Primary Health Care (PHC) Surveys in 2020, which seeks to assess progress of delivery of care in the district. The study consists of 5 long surveys, namely; Facility assessment, General Patient, Provider, Sick Child, Antenatal Care (ANC), primarily conducted in 4 health facilities in Neno district. These facilities include Neno district hospital, Dambe health centre, Chifunga and Matope. Usually, these annual surveys are conducted from January, and the target is to present final report by June. Once data is collected and analyzed, there are a series of reviews that take place before reaching final report. In the first place, the manual process took over 9 months to present final report. Initial findings reported about 76.9% of the data that added up when cross-checked with paper-based sources. Purpose: The aim of this approach is to run away from manually pulling the data, do fresh analysis, and reporting often associated not only with delays in reporting inconsistencies but also with poor quality of data if not done carefully. This automation approach was meant to utilize features of new technologies to create visualizations, reports, and dashboards in Power BI that are directly fished from the data source – CommCare hence only require a single click of a ‘refresh’ button to have the updated information populated in visualizations, reports, and dashboards at once. Methodology: We transformed paper-based questionnaires into electronic using CommCare mobile application. We further connected CommCare Mobile App directly to Power BI using Application Program Interface (API) connection as data pipeline. This provided chance to create visualizations, reports, and dashboards in Power BI. Contrary to the process of manually collecting data in paper-based questionnaires, entering them in ordinary spreadsheets, and conducting analysis every time when preparing for reporting, the team utilized CommCare and Microsoft Power BI technologies. We utilized validations and logics in CommCare to capture data with less errors. We utilized Power BI features to host the reports online by publishing them as cloud-computing process. We switched from sharing ordinary report files to sharing the link to potential recipients hence giving them freedom to dig deep into extra findings within Power BI dashboards and also freedom to export to any formats of their choice. Results: This data automation approach reduced research timelines from the initial 9 months’ duration to 5. It also improved the quality of the data findings from the original 76.9% to 98.9%. This brought confidence to draw conclusions from the findings that help in decision-making and gave opportunities for further researches. Conclusion: These results suggest that automating the research data process has the potential of reducing overall amount of time spent and improving the quality of the data. On this basis, the concept of data automation should be taken into serious consideration when conducting operational research for efficiency and decision-making.Keywords: reporting, decision-making, power BI, commcare, data automation, visualizations, dashboards
Procedia PDF Downloads 12224749 Secure Image Encryption via Enhanced Fractional Order Chaotic Map
Authors: Ismail Haddad, Djamel Herbadji, Aissa Belmeguenai, Selma Boumerdassi
Abstract:
in this paper, we provide a novel approach for image encryption that employs the Fibonacci matrix and an enhanced fractional order chaotic map. The enhanced map overcomes the drawbacks of the classical map, especially the limited chaotic range and non-uniform distribution of chaotic sequences, resulting in a larger encryption key space. As a result, this strategy improves the encryption system's security. Our experimental results demonstrate that our proposed algorithm effectively encrypts grayscale images with exceptional efficiency. Furthermore, our technique is resistant to a wide range of potential attacks, including statistical and entropy attacks.Keywords: image encryption, logistic map, fibonacci matrix, grayscale images
Procedia PDF Downloads 32024748 Detecting Black Hole Attacks in Body Sensor Networks
Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai
Abstract:
This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++
Procedia PDF Downloads 64924747 Impact of Information and Communication Technology on Academic Performance of Senior Secondary Schools Students in Gwagwalada Area Council of Federal Capital Territory, Abuja
Authors: Suleiman Garba, Haruna Ishaku
Abstract:
Information and communication technology (ICT) includes any communication device encompassing: radio, television, cellular phones, computer, satellite systems and so on, as well as the various services and applications associated with them. The significance of ICT cannot be over-emphasized in education. The teaching and learning processes have integrated with the application of ICTs for effectiveness and enhancement of academic performance among the students. Today, as the educational sector is faced with series of changes and reforms, it was noted that the problem of information technology illiteracy was a serious one among the schools’ teachers in the country as it cuts across primary, secondary schools and tertiary institutions. This study investigated the impact of ICT on the academic performance of senior secondary schools students in Gwagwalada Area Council of Federal Capital Territory (FCT), Abuja. A sample of 120 SSS III students was involved in the study. They were selected by using simple random sampling technique. A questionnaire was developed and validated through expert judgement and reliability co-efficient of 0.81 was obtained. It was used to gather relevant data from the respondents. Findings revealed that there was positive impact of ICT on academic performance of senior secondary schools students. The findings indicated the causes of poor academic performance among the students as lack of qualified teachers to teach in schools, peer group influence, and bullying. Significantly, the findings revealed that ICT had a positive impact on students’ academic performance. The null hypotheses were tested using t-test at 0.05 level of significance. It was discovered that there was significant difference between male and female secondary schools’ students' impact of ICT on academic performance in Gwagawalada Area Council of FCT-Abuja. Based on these findings, some recommendations were made which include: adequate funds should be provided towards procurement of ICT resources, relevant textbooks to enhance students’ active participation in learning processes and students should be provided with internet accessibility at inexpensive rate so as to create a platform for accessing useful information in the pursuit of academic excellence.Keywords: academic performance, impact, information communication technology, schools, students
Procedia PDF Downloads 22424746 A Survey on Various Technique of Modified TORA over MANET
Authors: Shreyansh Adesara, Sneha Pandiya
Abstract:
The mobile ad-hoc network (MANET) is an important and open area research for the examination and determination of the performance evolution. Temporary ordered routing algorithm (TORA) is adaptable and distributed MANET routing algorithm which is totally dependent on internet MANET Encapsulation protocol (IMEP) for the detection of the link and sensing of the link. If IMEP detect the wrong link failure then the network suffer from congestion and unnecessary route maintenance. Thus, the improvement in link detection method of TORA is introduced by various methods on IMEP by different perspective from different person. There are also different reactive routing protocols like AODV, TORA and DSR has been compared for the knowledge of the routing scenario for different parameter and using different model.Keywords: IMEP, mobile ad-hoc network, protocol, TORA
Procedia PDF Downloads 44524745 Data Analytics of Electronic Medical Records Shows an Age-Related Differences in Diagnosis of Coronary Artery Disease
Authors: Maryam Panahiazar, Andrew M. Bishara, Yorick Chern, Roohallah Alizadehsani, Dexter Hadleye, Ramin E. Beygui
Abstract:
Early detection plays a crucial role in enhancing the outcome for a patient with coronary artery disease (CAD). We utilized a big data analytics platform on ~23,000 patients with CAD from a total of 960,129 UCSF patients in 8 years. We traced the patients from their first encounter with a physician to diagnose and treat CAD. Characteristics such as demographic information, comorbidities, vital, lab tests, medications, and procedures are included. There are statistically significant gender-based differences in patients younger than 60 years old from the time of the first physician encounter to coronary artery bypass grafting (CABG) with a p-value=0.03. There are no significant differences between the patients between 60 and 80 years old (p-value=0.8) and older than 80 (p-value=0.4) with a 95% confidence interval. This recognition would affect significant changes in the guideline for referral of the patients for diagnostic tests expeditiously to improve the outcome by avoiding the delay in treatment.Keywords: electronic medical records, coronary artery disease, data analytics, young women
Procedia PDF Downloads 15124744 Factors Affecting Expectations and Intentions of University Students’ Mobile Phone Use in Educational Contexts
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance- Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling(SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: education, mobile behavior, mobile learning, technology, Turkey
Procedia PDF Downloads 42524743 International Trade and Regional Inequality in South America: A Study Applied to Brazil and Argentina
Authors: Mónica Arroyo
Abstract:
South America shows increasing decline in regional export values in the last years, after a strong growth of trade flows especially with China up to 2013. This change is due to the end of the commodity price boom, the slowing of the Chinese economy and the effects of the 2008 economic crisis. This paper examines the integration of regional economies in this context, particularly the situation in Brazil and Argentina. Based on transformations over the last two decades, the analysis is focused on the spatial circuits of production linked to foreign markets, contributing to the understanding of the different uses of territory and the within-country inequality. The South American regional exports, consisting basically of raw materials, are concentrated in a few companies. Large areas are intended for the production of agriculture and mining commodities, under the command of major economic groups, both domestic and foreign, relegating the local population to less productive places or, in most cases, forcing them to change their activity and to migrate to other regions in search of some source of income. On the other hand, the dynamics of these commodities’ spatial circuits of production print requirements in territories in terms of infrastructure and regulation. Capturing this movement requires understanding businesses and government’s role in territorial regulation, and consequently how regional systems are changing – for instance, economic specialisation, growing role of services, investment in roads, railways, ports, and airports. This paper aims to highlight topics for discussion on regional economic dynamics and their different degrees of internationalisation. The intention is to contribute to the debate about the relations between trade, globalization, and development.Keywords: regional inequality, international trade, developing world, South America
Procedia PDF Downloads 26224742 Characterization of Defense-Related Genes and Metabolite Profiling in Oil Palm Elaeis guineensis during Interaction with Ganoderma boninense
Authors: Mohammad Nazri Abdul Bahari, Nurshafika Mohd Sakeh, Siti Nor Akmar Abdullah
Abstract:
Basal stem rot (BSR) is the most devastating disease in oil palm. Among the oil palm pathogenic fungi, the most prevalent and virulent species associated with BSR is Ganoderma boninense. Early detection of G. boninense attack in oil palm wherein physical symptoms has not yet appeared can offer opportunities to prevent the spread of the necrotrophic fungus. However, poor understanding of molecular defense responses and roles of antifungal metabolites in oil palm against G. boninense has complicated the resolving measures. Hence, characterization of defense-related molecular responses and production of antifungal compounds during early interaction with G. boninense is of utmost important. Four month-old oil palm (Elaeis guineensis) seedlings were artificially infected with G. boninense-inoculated rubber wood block via sitting technique. RNA of samples were extracted from roots and leaves tissues at 0, 3, 7 and 11 days post inoculation (d.p.i) followed with sequencing using RNA-Seq method. Differentially-expressed genes (DEGs) of oil palm-G. boninense interaction were identified, while changes in metabolite profile will be scrutinized related to the DEGs. The RNA-Seq data generated a total of 113,829,376 and 313,293,229 paired-end clean reads from untreated (0 d.p.i) and treated (3, 7, 11 d.p.i) samples respectively, each with two biological replicates. The paired-end reads were mapped to Elaeis guineensis reference genome to screen out non-oil palm genes and subsequently generated 74,794 coding sequences. DEG analysis of phytohormone biosynthetic genes in oil palm roots revealed that at p-value ≤ 0.01, ethylene and jasmonic acid may act in antagonistic manner with salicylic acid to coordinate defense response at early interaction with G. boninense. Findings on metabolite profiling of G. boninense-infected oil palm roots and leaves are hoped to explain the defense-related compounds elicited by Elaeis guineensis in response to G. boninense colonization. The study aims to shed light on molecular defense response of oil palm at early interaction with G. boninense and promote prevention measures against Ganoderma infection.Keywords: Ganoderma boninense, metabolites, phytohormones, RNA-Seq
Procedia PDF Downloads 26624741 Algorithm for Improved Tree Counting and Detection through Adaptive Machine Learning Approach with the Integration of Watershed Transformation and Local Maxima Analysis
Authors: Jigg Pelayo, Ricardo Villar
Abstract:
The Philippines is long considered as a valuable producer of high value crops globally. The country’s employment and economy have been dependent on agriculture, thus increasing its demand for the efficient agricultural mechanism. Remote sensing and geographic information technology have proven to effectively provide applications for precision agriculture through image-processing technique considering the development of the aerial scanning technology in the country. Accurate information concerning the spatial correlation within the field is very important for precision farming of high value crops, especially. The availability of height information and high spatial resolution images obtained from aerial scanning together with the development of new image analysis methods are offering relevant influence to precision agriculture techniques and applications. In this study, an algorithm was developed and implemented to detect and count high value crops simultaneously through adaptive scaling of support vector machine (SVM) algorithm subjected to object-oriented approach combining watershed transformation and local maxima filter in enhancing tree counting and detection. The methodology is compared to cutting-edge template matching algorithm procedures to demonstrate its effectiveness on a demanding tree is counting recognition and delineation problem. Since common data and image processing techniques are utilized, thus can be easily implemented in production processes to cover large agricultural areas. The algorithm is tested on high value crops like Palm, Mango and Coconut located in Misamis Oriental, Philippines - showing a good performance in particular for young adult and adult trees, significantly 90% above. The s inventories or database updating, allowing for the reduction of field work and manual interpretation tasks.Keywords: high value crop, LiDAR, OBIA, precision agriculture
Procedia PDF Downloads 40424740 Factors Affecting Expectations and Intentions of University Students in Educational Context
Authors: Davut Disci
Abstract:
Objective: to measure the factors affecting expectations and intentions of using mobile phone in educational contexts by university students, using advanced equations and modeling techniques. Design and Methodology: According to the literature, Mobile Addiction, Parental Surveillance-Safety/Security, Social Relations, and Mobile Behavior are most used terms of defining mobile use of people. Therefore, these variables are tried to be measured to find and estimate their effects on expectations and intentions of using mobile phone in educational context. 421 university students participated in this study and there are 229 Female and 192 Male students. For the purpose of examining the mobile behavior and educational expectations and intentions, a questionnaire is prepared and applied to the participants who had to answer all the questions online. Furthermore, responses to close-ended questions are analyzed by using The Statistical Package for Social Sciences(SPSS) software, reliabilities are measured by Cronbach’s Alpha analysis and hypothesis are examined via using Multiple Regression and Linear Regression analysis and the model is tested with Structural Equation Modeling (SEM) technique which is important for testing the model scientifically. Besides these responses, open-ended questions are taken into consideration. Results: When analyzing data gathered from close-ended questions, it is found that Mobile Addiction, Parental Surveillance, Social Relations and Frequency of Using Mobile Phone Applications are affecting the mobile behavior of the participants in different levels, helping them to use mobile phone in educational context. Moreover, as for open-ended questions, participants stated that they use many mobile applications in their learning environment in terms of contacting with friends, watching educational videos, finding course material via internet. They also agree in that mobile phone brings greater flexibility to their lives. According to the SEM results the model is not evaluated and it can be said that it may be improved to show in SEM besides in multiple regression. Conclusion: This study shows that the specified model can be used by educationalist, school authorities to improve their learning environment.Keywords: learning technology, instructional technology, mobile learning, technology
Procedia PDF Downloads 45624739 Studying the Effectiveness of Using Narrative Animation on Students’ Understanding of Complex Scientific Concepts
Authors: Atoum Abdullah
Abstract:
The purpose of this research is to determine the extent to which computer animation and narration affect students’ understanding of complex scientific concepts and improve their exam performance, this is compared to traditional lectures that include PowerPoints with texts and static images. A mixed-method design in data collection was used, including quantitative and qualitative data. Quantitative data was collected using a pre and post-test method and a close-ended questionnaire. Qualitative data was collected through an open-ended questionnaire. A pre and posttest strategy was used to measure the level of students’ understanding with and without the use of animation. The test included multiple-choice questions to test factual knowledge, open-ended questions to test conceptual knowledge, and to label the diagram questions to test application knowledge. The results showed that students on average, performed significantly higher on the posttest as compared to the pretest on all areas of acquired knowledge. However, the increase in the posttest score with respect to the acquisition of conceptual and application knowledge was higher compared to the increase in the posttest score with respect to the acquisition of factual knowledge. This result demonstrates that animation is more beneficial when acquiring deeper, conceptual, and cognitive knowledge than when only factual knowledge is acquired.Keywords: animation, narration, science, teaching
Procedia PDF Downloads 17324738 Asymmetrical Informative Estimation for Macroeconomic Model: Special Case in the Tourism Sector of Thailand
Authors: Chukiat Chaiboonsri, Satawat Wannapan
Abstract:
This paper used an asymmetric informative concept to apply in the macroeconomic model estimation of the tourism sector in Thailand. The variables used to statistically analyze are Thailand international and domestic tourism revenues, the expenditures of foreign and domestic tourists, service investments by private sectors, service investments by the government of Thailand, Thailand service imports and exports, and net service income transfers. All of data is a time-series index which was observed between 2002 and 2015. Empirically, the tourism multiplier and accelerator were estimated by two statistical approaches. The first was the result of the Generalized Method of Moments model (GMM) based on the assumption which the tourism market in Thailand had perfect information (Symmetrical data). The second was the result of the Maximum Entropy Bootstrapping approach (MEboot) based on the process that attempted to deal with imperfect information and reduced uncertainty in data observations (Asymmetrical data). In addition, the tourism leakages were investigated by a simple model based on the injections and leakages concept. The empirical findings represented the parameters computed from the MEboot approach which is different from the GMM method. However, both of the MEboot estimation and GMM model suggests that Thailand’s tourism sectors are in a period capable of stimulating the economy.Keywords: TThailand tourism, Maximum Entropy Bootstrapping approach, macroeconomic model, asymmetric information
Procedia PDF Downloads 296